IOC Report
0ADLfPX6HX.elf

loading gif

Files

File Path
Type
Category
Malicious
0ADLfPX6HX.elf
ELF 32-bit MSB executable, MIPS, MIPS-I version 1 (SYSV), statically linked, stripped
initial sample
malicious
/tmp/qemu-open.5ajnH3 (deleted)
data
dropped

Processes

Path
Cmdline
Malicious
/tmp/0ADLfPX6HX.elf
/tmp/0ADLfPX6HX.elf
/tmp/0ADLfPX6HX.elf
-
/tmp/0ADLfPX6HX.elf
-
/usr/libexec/gnome-session-binary
-
/bin/sh
/bin/sh -e -u -c "export GIO_LAUNCHED_DESKTOP_FILE_PID=$$; exec \"$@\"" sh /usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/libexec/gsd-rfkill
/usr/lib/systemd/systemd
-
/lib/systemd/systemd-hostnamed
/lib/systemd/systemd-hostnamed

Domains

Name
IP
Malicious
cnc.voidnet.click
94.156.79.77

IPs

IP
Domain
Country
Malicious
94.156.79.77
cnc.voidnet.click
Bulgaria
89.190.156.145
unknown
United Kingdom
109.202.202.202
unknown
Switzerland
91.189.91.43
unknown
United Kingdom
91.189.91.42
unknown
United Kingdom

Memdumps

Base Address
Regiontype
Protect
Malicious
7f6323de9000
page read and write
7f6324ab5000
page read and write
7f6324abd000
page read and write
7f631c000000
page read and write
7f629c45b000
page read and write
7f63247ab000
page read and write
7ffe4450b000
page read and write
7f632445d000
page read and write
561ad8175000
page execute and read and write
7f6323ddb000
page read and write
7f632447a000
page read and write
561ad5ee5000
page execute read
561ad616d000
page read and write
7ffe445b2000
page execute read
7f632443a000
page read and write
561ad6177000
page read and write
7f6324099000
page read and write
7f632498c000
page read and write
561ad8527000
page read and write
7f629c418000
page execute read
561ad818c000
page read and write
7f629c458000
page read and write
7f631c021000
page read and write
7f6324b02000
page read and write
7f63235d3000
page read and write
There are 15 hidden memdumps, click here to show them.